Abstract
In this paper, we propose a pseudo-random beamforming (PRBF) technique for improving physical-layer security (PLS) in multiple input multiple output (MIMO) downlink cellular networks consisting of a legitimate base station (BS), multiple legitimate mobile stations (MSs) and potential eavesdroppers. The legitimate BS can obtain available potential eavesdroppers’ channel state information (CSI), which is registered in an adjacent cell. In the proposed PRBF technique, the legitimate BS pseudo-randomly generates multiple candidates of the transmit beamforming (BF) matrix, in which each transmit BF matrix consists of multiple orthonormal BF vectors and shares BF information with legitimate MSs before data transmission. Each legitimate MS generates receive BF vectors to maximize the receive signal-to-interference-plus-noise (SINR) for all pseudo-randomly generated transmit beams and calculates the corresponding SINR. Then, each legitimate MS sends a single beam index and the corresponding SINR value of the BF vector that maximizes the received SINR for each BF matrix since a single spatial stream is sent to each legitimate MS. Based on the feedback information from legitimate MSs and the CSI from the legitimate BS to eavesdroppers, the legitimate BS selects the optimal transmit BF matrix and the legitimate MSs that maximizes secrecy sum-rate. We also propose a codebook-based opportunistic feedback (CO-FB) strategy to reduce feedback overhead at legitimate MSs. Based on extensive computer simulations, the proposed PRBF with the proposed CO-FB significantly outperforms the conventional random beamforming (RBF) with the conventional opportunistic feedback (O-FB) strategies in terms of secrecy sum-rate and required feedback bits.
Highlights
Security of wireless communication has received much attention from both academia and industry.Secure transmission is significantly important especially for military communications
We investigate the secrecy sum-rate in single-cell multiple input multiple output (MIMO) downlink cellular networks consisting of a legitimate base station (BS) with multiple antennas, legitimate mobile stations (MSs) with multiple antennas and eavesdroppers with multiple antennas
We evaluated the conventional random beamforming (RBF) and the proposed pseudo-random beamforming (PRBF) in MIMO downlink cellular network consisting of legitimate MSs and eavesdroppers according to various system parameters such as the number of transmit BF matrix candidates, the number of legitimate MSs, and the predetermined value in the conventional opportunistic feedback (O-FB) and the proposed codebook-based opportunistic feedback (CO-FB)
Summary
Security of wireless communication has received much attention from both academia and industry. In [22], an orthogonal RBF technique with a opportunistic user scheduling algorithm was proposed to improve PLS in a single-cell MISO downlink cellular network where it is assumed that each legitimate MS is wire-tapped by an eavesdropper as a worst-case secrecy scenario. In multi-user multiple-input single-output multi-eavesdropping antennas (MU-MISOME) wire-tap network, the authors assumed that all of wireless channel matrices are known to the legitimate sender with multiple antennas and multiple legitimate receivers with a single antenna. To maximize the achievable secrecy sum-rate in downlink cellular networks consisting of legitimate MSs with a single antenna and a potential eavesdropper, the PRBF technique based on legitimate MSs’ feedback information and a potential eavesdropper’s CSI is proposed.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.